Steven Seiden, president of Acquired Data Solutions (ADS), has been involved in “digital divide issues” for more than 20 years, and he believes broadening inclusion and diversity in the STEM literacy field is one of his purposes. An engineer by trade, Seiden has experienced a shift in the tech world over the years, watching the convergence of technology, IT and IOT and noting the ever-expanding engineering lifecycle that now includes security.
Here’s an embarrassing admission: I’m a lifelong Jets fan. If you need proof that the organization is considered a laughingstock, a 2019 article in Inc. magazine is titled, “Want to Be a Great Leader? Look to the New York Jets—and Then Do the Opposite.”
Security search firms are frequently contacted by job seekers who reach out to request the recruitment company assist them in finding a new job. Inquiries come from professionals and executives in various stages of their public or private sector careers.
Today, open-source code is everywhere. In fact, 99% of all codebases contain open-source code, and anywhere from 85% to 97% of enterprise codebases come from open-source. What does that mean, exactly? It means that the vast majority of our applications consist of code we did not write.
We have previously talked about many aspects of how to advance your security career. This includes having a thorough understanding of both soft and operational skills sought after by organizations. The ability to execute on these attributes is valued when companies look for top talent for senior level security roles.
Last month this column looked at how humor can enhance leadership. Inspired by the book "Plato and a Platypus Walk Into a Bar: Understanding Philosophy Through Jokes," this month’s column explains security leadership through jokes.
Unfortunately, diversity is still underrepresented in security. Our profession continues to struggle to attract and/or advance diverse candidates into leadership ranks in numbers that accurately represent a cross section of the working population.
Security professionals who are considering the potential direction for their private sector career often overlook certain functional areas. While considered part of a security leader’s portfolio, many of these less obvious choices offer a broad diversity of challenges. One of these areas found in almost every industry sector is investigations.
As China forges its role as one of the great world powers, it relies upon a blast furnace of espionage operations to acquire foreign technologies and intellectual property, better position itself against competing international powers and control its own image both at home and abroad.
What are some key areas to consider when you are constructing a strategy to address your successor and the replacement of other positions within your direct and functional organization?